Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Enterprise Integrity Content Generation and Utilization

a technology of integrity content and enterprise, applied in the field of knowledge processing system for risk assessment and analysis, can solve the problems of reducing the value of one or more assets in the set of assets, etc., and achieves the effect of reducing the work load improving the return on investment for potential projects, and reducing the workload of any single person to report on security measures

Inactive Publication Date: 2008-04-03
SAP AG
View PDF18 Cites 66 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]The invention can be implemented to include one or more of the following advantageous features. Project data representing a proposed project may be received, the proposed project modifying the set of measures by adding additional measures to the set of measures or enhancing one or more measures in the set of measures or both. A return on investment of the proposed project may be calculated based on the modified set of measures and the additional threat. The current status may be represented by a percentage value, with 100 percent representing full compliance with the one or more requirements and 0 percent indicating no compliance with the one or more requirements. The current status may be displayed graphically, wherein the current status is indicated by one of the following colors: red, indicating no compliance or a low level of compliance; yellow, indicating a medium level of compliance; and green, indicating a high level of compliance or full compliance. A report may be generated, the report indicating the level of compliance with the one or more requirements.
[0007]The invention can be implemented to include one or more of the following advantageous features. A potential reduction of risk of one or more assets may be calculated due to the implementation level of each measure. A report may be generated, the report including one or more of the status of each asset or group of assets, the status of each threat or group of threats, the status of each measure or group of measures, or the implementation level for each measure or group of measures, and the report may be displayed to one or more individuals. Each assessment may include three ratings: knowledge, readiness, and penetration. The assessment may be received from e an interview form, the interview form including one or more questions about each measure. The interview form may be completed by an individual with knowledge of one or more measures. The interview form presented to the individual may only includes questions relating to the one or more measures knowledgeable to the individual. The individual may respond to the questions included on the interview form by selecting a color code representing the individual's response. The color code may include the following colors, each color being associated with a numerical rating: red, indicating a low rating of the measure by the individual; yellow, indicating a medium rating of the measure by the individual; green, indicating a high rating of the measure by the individual, white, indicating that the rating of the measure is unknown by the individual, and black, indicating that the measure is not applicable to the individual.
[0008]In another aspect, asset data representing a set of assets is received, the asset data includes a respective value for each asset in the set of assets having a value. Threat data representing a set of threats is received; each threat in the set of threats potentially reduces the value of one or more of the assets in the set of assets. Measures data representing a set of measures is received; each measure in the set of measures protects the value of one or more assets from the additional one or more threats of failing to satisfy the one or more requirements. A loss expectancy based upon the value of the assets, the potential reduction of value caused by the threats, and the protection of the value caused by the measures is automatically calculated. Project data representing a simulated project is received, the simulated project modifying one or more assets, threats, or measures. A revised loss expectancy is automatically calculated based upon the value of the assets, the potential reduction of value caused by the threats, and the protection of the value caused by the measures as modified by the simulated project. A savings caused by the simulated project is automatically calculated based upon the loss expectancy and revised loss expectancy.
[0009]The invention can be implemented to include one or more of the following advantageous features. A cost of the simulated project may be received. A return on investment based on the savings and the cost may be calculated. A report may be generated, the report including the savings caused by one or more simulated projects and / or the return on investment of one or more simulated projects.
[0010]The invention can be implemented to realize one or more of the following advantages. Data relating to security risks and concerns and considerations can be gathered and integrated from a wide array of sources. The individual or individuals responsible for a particular area are automatically informed of risks and concerns that fall within their responsibilities. The workload on any single person to report on security measures is reduced. Reports can be generated that reflect the security and risk situation of an entire organization, including the individual units that make up the organization, in addition to reports generated for each individual unit. Reports can be generated on a real-time basis, reflecting the most current information available. Predictions and recommendations can be automatically provided based on the information available. The risks and benefits of a potential project can be simulated, and the return on investment for the potential project can be calculated. Potential changes in the physical or regulatory environment can be simulated to determine possible risks, as well as to determine potential measures that can be taken to ameliorate my additional risk. One implementation of the invention provides all of the above advantages.

Problems solved by technology

Threat data representing a set of threats is received; each threat in the set of threats potentially reduces the value of one or more of the assets in the set of assets.
Threat data representing a set of threats is received; each threat in the set of threats potentially reduces the value of one or more of the assets in the set of assets.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Enterprise Integrity Content Generation and Utilization
  • Enterprise Integrity Content Generation and Utilization
  • Enterprise Integrity Content Generation and Utilization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027]FIG. 1 illustrates a security-related infrastructure for an organization. The organization has assets 102. Anything that has value to the organization and that requires protection can be an asset. Assets can include tangible and non-tangible items. Examples of possible assets 102 include customer data, a Windows server, facilities / physical plant, employees, brand value, and public image. Typically, it is desirable to keep the value of a particular asset as high as possible; alternatively, it is also desirable to keep the total cost of ownership (“TCO”) for a particular asset as low as possible. The assets 102 are used by the organization to support the various processes 122 undertaken by the organization in its ordinary course of business.

[0028]Security related incidents 104 generally lower the value of one or more assets 102. A single incident can lower the value of a single asset or the value of multiple assets at the same time. For example, a fire at a warehouse lowers the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Methods and apparatus, including computer program products, for risk assessment and analysis. In one general aspect, asset data representing a set of assets is received. Threat data representing a set of threats is received. Requirements data representing one or more requirements is received, wherein each requirement requires compliance with a regulation and a failure to satisfy the requirement constitutes a threat additional to the set of threats. Measures data representing a set of measures is received. A current status is calculated using the measures data and the requirements data based on a level of compliance with the requirements, the level of compliance determined by the measures and the additional one or more threats to one or more assets represented by the measures data and the requirements data.

Description

BACKGROUND[0001]The present invention relates to a knowledge processing system for risk assessment and analysis.[0002]Risk management is an important consideration for any organization. However, potential risks fall into a very diverse array of categories, including risks relating to information technology (e.g., computer viruses or hackers), risks relating to physical facilities (e.g., fire, flood, earthquake, or burglary), as well as legal risks (e.g., failure to comply with statutory or regulatory requirements). In addition, measures that can be taken to mitigate potential risk can frequently overlap and protect against multiple risks, even across different categories. For example, a security system added to protect a file or web server from physical attacks can protect against hackers gaining physical access to the server, mitigating an information technology risk, as well as protect against burglaries, mitigating a physical facilities risk.[0003]However, different individuals a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06Q10/00G06Q30/00
CPCG06Q30/0278G06Q40/08G06Q40/06
Inventor PAULUS, SACHAR M.WAGNER, GUIDOBITZ, GUNTER
Owner SAP AG
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products